Cybercrime as a Modern Threat to Military Security
Abstract
Crime does not stand still and evolves with humanity. With the development of technologies, new types of crimes have appeared and, accordingly, new threats that today challenge not only an individual, but entire states, creating risks of harm not only to the economic sector, but to military and national security in general. At the same time, it is important that cybercrime in the field of military security can cause harm to the entire defense complex of the country, leaving the state defenseless against other threats which is unacceptable in order to preserve the sovereignty and the independence of the young democratic state. In this connection, it is necessary to recognize cybercrime at the state level as a threat that could cause harm to military security.
References
[2] Akhmetshin, E.M., Vasilev, V.L. 2016. Control as an instrument of management and institution of economic security. Academy of Strategic Management Journal 15 (Special Issue1): 1 – 7.
[3] Akhmetshin, E.M., Vasilev, V.L., Gapsalamov, A.R., Pavlyuk, A.V., Sharipov, R.R., Gatin, R.G. 2018. Formation of Institutional Arrangement of Economic Security Improvement of Russia: Task Definition. Proceedings of the 31st International Business Information Management Association Conference – Innovation Management and Education Excellence through Vision 2020: 6395 – 6401.
[4] Apakhayev, N., Koishybaiuly, K., Khudaiberdina, G., Urisbayeva, A., Khamzina, Z.A., Buribayev, Y.A. 2017. Legal basis for ensuring freedom of access to information on the operation of state administration bodies in Kazakhstan. Journal of Advanced Research in Law and Economics 8(3): 722 – 729.
[5] Bangkok Declaration ‘Interaction and Response: Strategic Unions in Crime Prevention and Criminal Justice’.2005. http://www.un.org/ru/documents/decl_conv/declarations/bangkok_declaration.shtml.
[6] Bobrov, A. 2013. Information war: from leaflets to twitter. Foreign Military Review 1: 20 – 27.
[7] Borodaky, Yu.V., Dobrodeev, A.Yu., and Butusov, I.V. 2013. Cybersecurity as the main factor of national and international security of the XXI century (Part 1). Questions of Cybersecurity 1(1): 2 – 9.
[8] Countries are named with the highest costs of cyber war. 2017. https://korrespondent.net/world/3798645-nazvany-strany-s-samymy-vysokymy-raskhodamy-na-kybervoiska.
[9] Dobrenkov, V.I., and Agapov, P.V. 2011. War and security of Russia in the 21st century. Academic Project; Alma Mater.
[10] Federal Law of 27.07.2006 N 149-FZ (as amended on 07.19.2018) ‘On Information, Information Technologies and on the Protection of Information’. 2018. http://www.consultant.ru/document/cons_doc_LAW_61798/c5051782233acca771e9adb35b47d3fb82c9ff1c/.
[11] Khramchikhin, A.A. 2011. Strategic concepts of China in the geopolitical aspect. International Research 3-4: 18 – 23.
[12] Korsakov, G.B. 2012. The role of information weapons in the military-political strategy of the USA. USA and Canada: Economy, Politics, Culture 1: 39 – 60.
[13] Large hacker attacks in 2001 – 2016: chronology. 2016. https://tass.ru/info/1408961.
[14] Medin, A., and Marinin, A. 2013. Features of the use of cyberspaces in interstate military and in internal conflicts. Foreign Military Review 3: 11 – 16.
[15] Mishchenko, V.I., Naumenkova, S.V., Shapoval, O.A. 2016. Consumer loans securitization. Actual Problems of Economics 186(12): 311 – 321.
[16] Parshin, S.A., Gorbachev, Yu.E., and Kozhanov, Yu.A. 2011. Cyberwar is a Real Threat to National Security. Publishing House KRASAND.
[17] Partika, T.L., and Popov, I.I. 2010. Information Security. Forum.
[18] Rastorguev, S.P. 2006. Information War. Problems and Models (Existential Mathematics in the Information War). Helios ARV.
[19] Resolution of the Government of the Republic of Kazakhstan of June 30, 2017 No. 407 ‘On Approval of the Cyber Security Concept (‘Cybershield of Kazakhstan’). 2017. http://adilet.zan.kz/rus/docs/P1700000407.
[20] Russia took 10th in the UN Cybersecurity Index.2017. http://safe.cnews.ru/news/top/2017-08-01_rossiya_na_11_meste_v_indekse_kiberbezopasnosti.
[21] Syroezhkin, K.L.2008. China: Military Security. KazISS.
[22] The military doctrine of the Republic of Kazakhstan. Approved by the Decree of the President of the Republic of Kazakhstan of September 29, 2017 No. 554. 2017. http://adilet.zan.kz/rus/docs/U1700000554.
[23] The Thirteenth Congress United Nations on Crime Prevention and Criminal Justice. 2015. https://www.unodc.org/documents/congress/Documentation/A-CONF.222-12_Workshop3/ACONF222_12_r_V1500665.pdf.
[24] Wade, N.M. 2012. The Joint Forces Operations and Doctrine. The Lightning Press.
[25] Why the state is ready to pay for digital security. 2017. https://informburo.kz/stati/pochemu-gosudarstvo-gotovo-platit-za-nashu-i-svoyu-cifrovuyu-bezopasnost-.html.
The Copyright Transfer Form to ASERS Publishing (The Publisher)
This form refers to the manuscript, which an author(s) was accepted for publication and was signed by all the authors.
The undersigned Author(s) of the above-mentioned Paper here transfer any and all copyright-rights in and to The Paper to The Publisher. The Author(s) warrants that The Paper is based on their original work and that the undersigned has the power and authority to make and execute this assignment. It is the author's responsibility to obtain written permission to quote material that has been previously published in any form. The Publisher recognizes the retained rights noted below and grants to the above authors and employers for whom the work performed royalty-free permission to reuse their materials below. Authors may reuse all or portions of the above Paper in other works, excepting the publication of the paper in the same form. Authors may reproduce or authorize others to reproduce the above Paper for the Author's personal use or for internal company use, provided that the source and The Publisher copyright notice are mentioned, that the copies are not used in any way that implies The Publisher endorsement of a product or service of an employer, and that the copies are not offered for sale as such. Authors are permitted to grant third party requests for reprinting, republishing or other types of reuse. The Authors may make limited distribution of all or portions of the above Paper prior to publication if they inform The Publisher of the nature and extent of such limited distribution prior there to. Authors retain all proprietary rights in any process, procedure, or article of manufacture described in The Paper. This agreement becomes null and void if and only if the above paper is not accepted and published by The Publisher, or is with drawn by the author(s) before acceptance by the Publisher.